Apache QPID 0.14, 0.16, and earlier uses a NullAuthenticator mechanism to authenticate catch-up shadow connections to AMQP brokers, which allows remote attackers to bypass authentication.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://svn.apache.org/viewvc?view=revision&revision=1352992 | |
http://secunia.com/advisories/50186 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/54954 | vdb entry |
http://rhn.redhat.com/errata/RHSA-2012-1279.html | vendor advisory |
https://issues.apache.org/jira/browse/QPID-3849 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/77568 | vdb entry |
http://rhn.redhat.com/errata/RHSA-2012-1277.html | vendor advisory |
http://secunia.com/advisories/50698 | third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=836276 | |
http://www.openwall.com/lists/oss-security/2012/08/09/6 | mailing list |